Suggested Topics within your search.
Suggested Topics within your search.
- Law 6
- Management 6
- Nursing 6
- methods 6
- Nursing Assessment 5
- Nursing Care 5
- Philosophy 5
- Information technology 4
- Surgical nursing 4
- Anesthesia 3
- Automobiles 3
- Economic conditions 3
- Economic development 3
- Electric power systems 3
- Electronics 3
- Human-computer interaction 3
- Jurisprudence 3
- Management information systems 3
- Microbiology 3
- Nervous System 3
- Neuroanatomy 3
- Pharmaceutical Preparations 3
- Physiology 3
- Politics and government 3
- Telecommunication 3
- administration & dosage 3
- physiology 3
- Anatomy 2
- Cardiovascular system 2
- Cloud computing 2
-
38361
Prevention of Leptospirosis Infected Vector and Human Population by Multiple Control Variables
Published 2014-01-01“…We completely characterize the optimal control problem and compute the numerical solution of the optimality system using an iterative method.…”
Get full text
Article -
38362
SYNERGY BETWEEN THE YOUTH AND A SECURED NATION: AN ATTEMPT TO DEVELOP NIGERIA THROUGH POLITICS AND ELECTORAL REMINISCENCE
Published 2024-05-01“…Survey research method with the use of questionnaire to garner responses from various stakeholders and politicians was adopted by the researcher. System Theory was used to navigate the study with expected findings. …”
Get full text
Article -
38363
Recovery mechanism of large-scale damaged edge computing network in industrial Internet of things
Published 2021-04-01“…Given the limited resources at early stages for recovery, a failure recovery mechanism of the edge computing network considering both computational demands and repair costs was proposed, which intends to tackle the problem of the high probability of large-scale cascading failure caused by the interdependence between the edge computing network and other subnetworks in industrial Internet of things (IIoT).Considering the network structure (topology and link capacity) and network dynamics (computational demands), a joint link recovery selection and computation migration optimization problem was formulated under the conservation of node computing requirements.By leveraging the Benders decomposition algorithm, the NP-hard problem was transformed into a main problem and a sub-problem, which were interdependent and could be solved in polynomial time through the approximation of cutting planes.A local branching method was further introduced to guarantee the non-increasing nature of the Benders upper bound, thus accelerating the convergence of Benders decomposition.Simulation results demonstrate that the proposed algorithm outperforms the conventional topology-based recovery algorithm in system utility, and can perform well in multiple scenarios.…”
Get full text
Article -
38364
A Selection Model of Strategic Emerging Industries in Fujian Based on Entropy-VIKOR Algorithm
Published 2021-01-01“…In this paper, according to the characteristics of strategic emerging industries, drawing on the double helix model, this paper sets up an evaluation system for strategic emerging industries. Then, the entropy-VIKOR algorithm was introduced to evaluate and rank the backbone enterprises in Fujian, based on the data on 21 listed enterprises of strategic emerging industries in the province from 2017 to 2019. …”
Get full text
Article -
38365
Sharing talk, sharing cognition: philosophy with children as the basis for productive classroom interaction
Published 2017-02-01“…Taking the linguistic turn requires an examination of the relationship between thought and language: starting with Wittgenstein, we draw out the implications of expressing thought in a jointlyconstructed system of meaning. We then examine the relationship between thought and language in a pedagogical context by drawing on the practice of philosophy with children in the classroom, identifying key skills which are important in the development of meaningful classroom interaction, connecting this to philosophy with children practice. …”
Get full text
Article -
38366
Study on the Miscibility of Polypyrrole and Polyaniline Polymer Blends
Published 2018-01-01“…Characterization of the polymer blends was carried out based on the data analysis from Fourier transform infrared spectroscopy (FT-IR), X-ray diffraction (XRD), and differential scanning calorimetry (DSC). The PPy/PANI system was successfully formed blends in DMSO solvent. …”
Get full text
Article -
38367
A Novel End Effector for Telemanipulated Suturing in Robot-Assisted Laparoscopy
Published 2024-09-01“…The end effector is integrated into the DLR MiroSurge system to facilitate telemanipulated suturing. The mechanical properties of the end effector are characterized and its feasibility for use in robot-assisted laparoscopy is demonstrated.…”
Get full text
Article -
38368
A techno-economic study on the utilisation of airborne wind energy for reverse osmosis seawater desalination
Published 2025-01-01“…To understand the techno-economic feasibility of such a system, this research work studies a 2 MW airborne wind-driven reverse osmosis plant. …”
Get full text
Article -
38369
Current management of the stability of organizations of the investment and construction complex in crisis situations
Published 2021-07-01“…In methodological terms, the authors propose to use a system of indicative analysis and regulation of production and economic activities of enterprises of the real sector of the economy, as an organizational tool for resolving crisis situations in the economy. …”
Get full text
Article -
38370
Problems of obtaining state support for a film creation project
Published 2023-07-01“…Problems in the current system of state support have been identified and recommendations for their solution provided. …”
Get full text
Article -
38371
Super algebra and Harmonic Oscillator in Anti de Sitter space
Published 2019-04-01“…Finally we have obtained the various thermodynamics quantity of the system.…”
Get full text
Article -
38372
Calculation of RMS Current Load on DC-Link Capacitors for Multiphase Machine Drives under Carrier-Phase Shift Control
Published 2023-01-01“…In order to optimize the reliability and economy of the multiphase drive system, a Cotes method combined with carrier-phase shifting technology (CPST) for calculating RMS current of the dc-link capacitor is proposed. …”
Get full text
Article -
38373
Bulk Handling Facility Modeling and Simulation for Safeguards Analysis
Published 2018-01-01“…These models are used for designing the overall safeguards system, examining new safeguards approaches, virtually testing new measurement instrumentation, and analyzing diversion scenarios. …”
Get full text
Article -
38374
Multi-function supported privacy protection data aggregation scheme for V2G network
Published 2023-04-01“…In view of the problem that the functions of the current privacy protection data aggregation scheme were insufficient to meet the increasingly rich application requirements, a multi-function supported privacy protection data aggregation (MFPDA) scheme for V2G network was proposed.By using cryptographic algorithms such as BGN, BLS, and Shamir’s secret sharing, as well as fog computing and consortium blockchain technology, multiple security functions like fault tolerance, resistance to internal attacks, batch signature verification, no need for trusted third parties, and multiple aggregation functions were integrated into one privacy protection data aggregation scheme.Security analysis shows that the proposed scheme can protect data aggregation’s security, privacy and reliability.The performance evaluation shows that the introduction of fog computing can significantly reduce the computing overhead of the control center, and the reduction rate can be as high as 66.6%; the improvement of the consortium blockchain can effectively reduce the communication and storage overhead of the system, and the reduction rate can reach 16.7% and 24.9% respectively.…”
Get full text
Article -
38375
Big Data Analytics for Healthcare Industry: Impact, Applications, and Tools
Published 2019-03-01“…We also explore the conceptual architecture of big data analytics for healthcare which involves the data gathering history of different branches, the genome database, electronic health records, text/imagery, and clinical decisions support system.…”
Get full text
Article -
38376
FINANCIAL CONTROLLING STATUS AND POTENTIAL IN MEDIUM-SIZED ENTERPRISES OF TUZLA CANTON, BOSNIA AND HERZEGOVINA
Published 2020-11-01“…All the processes accompanying these activities are significantly faster and do not run in a classical way, which is why the management system nowadays requires that information requested within plan, analysis, and control run simultaneously. …”
Get full text
Article -
38377
Evolutionary Game Mechanism on Complex Networks of Green Agricultural Production under Intensive Management Pattern
Published 2020-01-01“…Detailed experimental results indicate that the double-score system under government guidance mechanism has a significant effect on the diffusion of the green agricultural production, of which the extra reward or penalty obtained from government is crucial. …”
Get full text
Article -
38378
Recent Advances in Methamphetamine Neurotoxicity Mechanisms and Its Molecular Pathophysiology
Published 2015-01-01“…This review summarized the numerous interdependent mechanisms including excessive dopamine, ubiquitin-proteasome system dysfunction, protein nitration, endoplasmic reticulum stress, p53 expression, inflammatory molecular, D3 receptor, microtubule deacetylation, and HIV-1 Tat protein that have been demonstrated to contribute to this damage. …”
Get full text
Article -
38379
Study on Vehicle Load Model of Baijianhe Bridge
Published 2022-01-01“…In order to calculate the vehicle load model of Baijianhe Bridge, based on the vehicle load data of the health monitoring system, the vehicle type, vehicle weight, wheelbase, and other information were counted and the data were processed and diagraphed to obtain the probability density distribution. …”
Get full text
Article -
38380
Certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration
Published 2022-05-01“…To solve the problems of single-user search, single-keyword search, high computational cost and low-security level of ciphertext data retrieval in the industrial Internet of things environment, a certificateless ciphertext retrieval scheme with multi-user and multi-keyword based on cloud-edge collaboration was proposed.A user access permissions table was set and once encryption algorithm was executed to realize multi-user search and update users’ access permissions.A cloud-side collaborative computing model was introduced to match keyword ciphertext and keyword trapdoor efficiently by a linear scanning method when the keyword ciphertext does not entirely contain the search keyword.Key escrow and certificate management problems were solved by utilizing certificateless encryption system.Keyword ciphertext authentication was ensured by using digital signature technology.The security analysis results show that the proposed scheme can resist internal keyword guessing attacks under the random oracle model.Simulation results show that the proposed scheme has higher computational efficiency compared with similar schemes.…”
Get full text
Article